Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 06:43

General

  • Target

    2c10455bda86d931f80239fed605f0c4.exe

  • Size

    217KB

  • MD5

    2c10455bda86d931f80239fed605f0c4

  • SHA1

    991efbb5d15e945f9c2f741d606c2cd9173d5f09

  • SHA256

    cab078c2a2c5c58d880224a12924b5e5f01e3b44b2e42755a1afb9bebfe3c831

  • SHA512

    9fd4813dfeede13156bfbadff791ab37a57c16ab9f3983b1d5877af34165994614ca7d65522094995d9102ec62263fdfc6f38abecb9f8e33e36738c5d2d9c33d

  • SSDEEP

    6144:NAJzqnhxwEa0JyJnx2bLPI0ADVoACLgk:SxWoEawyJ4LALEg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c10455bda86d931f80239fed605f0c4.exe
    "C:\Users\Admin\AppData\Local\Temp\2c10455bda86d931f80239fed605f0c4.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Windows\Rrikaa.exe
      C:\Windows\Rrikaa.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1572-45485-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1572-0-0x0000000000290000-0x00000000002A4000-memory.dmp

    Filesize

    80KB

  • memory/1572-1-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1572-8-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2472-45487-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2472-38915-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2472-9-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2472-45486-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2472-45488-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2472-45489-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2472-45490-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2472-45492-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2472-45493-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2472-45497-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2472-45498-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB